Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Policy and Data Infrastructure

Go to class
Write Review

Free Online Course: Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Policy and Data Infrastructure provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Microsoft Azure Security Technologies (AZ-500) Cert Prep: 4 Policy and Data Infrastructure is taught by Pete Zerger.

Overview
  • Prepare for the Secure Data and Applications domain of the Microsoft Azure Security Technologies (AZ-500) exam.

    Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is the perfect opportunity for IT professionals to demonstrate their skills to current and future employers. This course is the first of a two-part series that prepares candidates to excel in the Secure Data and Applications domain of the exam. Instructor Pete Zerger explains how to configure critical security policies for Azure storage accounts and enable security features for your Azure data infrastructure, including access control, Azure AD authentication, and shared access signatures for Azure Storage. Plus, learn how to secure big data solutions such as Cosmos DB and Azure Data Lake.

Syllabus
  • Introduction

    • Securing data and apps in Azure
    • What you should know
    • Exam overview
    1. Configure Security Policies to Manage Data
    • Configure access control for storage accounts
    • Configure key management for storage accounts
    • Configure Azure AD authentication for Azure Storage
    • Configure Azure AD Domain Services authentication for Azure files
    • Create and manage shared access signatures (SAS)
    • Create a shared access policy for a Blob or Blob container
    • Configure Storage service encryption
    2. Configure Security for Data Infrastructure
    • Enable database authentication
    • Enable database auditing
    • Configure Azure SQL Database Advanced Threat Protection
    • Configure security for HDInsight
    • Configure security for Cosmos DB
    • Configure security for Azure Data Lake
    Conclusion
    • Next steps